deck 10 accounting information systems romney and steinbart linda batch march 2012

15
Deck 10 Accounting Information Systems Romney and Steinbart Linda Batch March 2012

Upload: cory-mcdaniel

Post on 18-Jan-2016

220 views

Category:

Documents


3 download

TRANSCRIPT

Page 1: Deck 10 Accounting Information Systems Romney and Steinbart Linda Batch March 2012

Deck 10 Accounting Information Systems

Romney and SteinbartLinda BatchMarch 2012

Page 2: Deck 10 Accounting Information Systems Romney and Steinbart Linda Batch March 2012

Learning Objectives• IS Controls for System Reliability• Confidentiality and Availability

– Encryption– Process Controls – Input, Processing, Output– Availability

• Work on Assignment 4• Quiz (Chapter 7 and Chapter 8)

Page 3: Deck 10 Accounting Information Systems Romney and Steinbart Linda Batch March 2012

Chapter 9 – Preserving Confidentiality

• Intellectual property often is crucial to the to the organization’s long run competitive advantage

• Actions must be taken to preserve confidentiality:

– Identification and classification of information to be protected

– Encryption of sensitive information– Controlling access to sensitive information– Training

Page 4: Deck 10 Accounting Information Systems Romney and Steinbart Linda Batch March 2012

Chapter 9 – Encryption

• Encryption is a preventive control that can be used to protect both the confidentiality and privacy

• Encryption is the process of transforming normal content called plain text to unreadable gibberish, call ciphertext.

• Decryption reverses this process

Page 5: Deck 10 Accounting Information Systems Romney and Steinbart Linda Batch March 2012

Chapter 9 – Encryption

• Three factors determine the strength of the encryption– key length – longer keys provide stronger encryption by reducing the

number of repeating blocks– encryption algorithm – are designed to resist brute-force guessing

techniques– policies for managing the cryptographic keys – the most vulnerable

aspect of the encryption system hence cryptographic keys must be stored very securely

Page 6: Deck 10 Accounting Information Systems Romney and Steinbart Linda Batch March 2012

Chapter 9 – Encryption

• Cryptographic keys must be stored securely and protected with strong access controls.

• Best practices include not storing cryptographic keys in a browser or any other file that others users of that system can readily access and using a strong and long passphrase to protect the keys

• Organizations must have a way to decrypt data in the event the employee who encrypted it is no longer with the organization– Use software with a built in master key– Use key escrow – make copies of all encryption keys and used by

employees and store these copies securely

Page 7: Deck 10 Accounting Information Systems Romney and Steinbart Linda Batch March 2012

Chapter 9 – Encryption

• Types of Encryption Systems– Symmetric Encryption – use the same code to encrypt and decrypt

(DES and AES are examples)– Asymmetric Encryption – different system to encrypt an decrypt –

public key and private key (RSA and PGP)– Symmetric encryption is faster but it is less secure– Hashing

• takes plain text of any length and splits it into a short code called a hash• hashing algorithms will not recreate the document in the original plain text format• Good for verifying that the contents of a message have not been altered

Page 8: Deck 10 Accounting Information Systems Romney and Steinbart Linda Batch March 2012

Chapter 9 – Encryption

• Types of Encryption Systems Continued– Digital signatures

• Nonrepudiation – how to create legally binding agreements that cannot be unilaterally repudiated by either party

• Use hashing and asymmetric encryption simultaneously• Proof that a document has not been altered and proof of who created the file

– Digital Certificates• Electronic document that contains and entities public key and certifies the

integrity of the owner of that particular public key

– Public Key Infrastructure• Issuing pairs of public and private keys and corresponding digital certificates

Page 9: Deck 10 Accounting Information Systems Romney and Steinbart Linda Batch March 2012

Chapter 9 – Encryption

• Types of Encryption Systems Continued– Virtual Private Networks (VPN)

• Information must be encrypted within a system but also when it transmits over the internet

• Encrypted information, when it traverses the internet, creates a virtual private network (VPN)

• The VPN software that encrypts information while it transmits over the internet effectively creates private tunnels for those that have the keys

Page 10: Deck 10 Accounting Information Systems Romney and Steinbart Linda Batch March 2012

Chapter 10 – Processing Integrity

• Input Data integrity– Source documents should be prepared by authorized personnel– Forms Design– Cancellation and storage of source documents– Data entry controls

• Field check, sign check, limit check, range check, size check, completeness check, validity check, reasonableness check

– Additional batch processing and data entry controls• Sequence check, error log, batch totals

Page 11: Deck 10 Accounting Information Systems Romney and Steinbart Linda Batch March 2012

Chapter 10 – Processing Integrity

• Processing Controls– Data matching – two or more items of data must be matched prior to

processing– File labels – ensure the most current files are being updated– Recalculation of batch totals– Cross-footing and zero balance test– Write protection mechanisms that stop overwriting of data– Concurrent update controls – only one user update records at a time

Page 12: Deck 10 Accounting Information Systems Romney and Steinbart Linda Batch March 2012

Chapter 10 – Processing Integrity

• Output Controls– User review of output– Reconciliation procedures– External data reconciliation– Data transmission controls (check sums and parity bits)

Page 13: Deck 10 Accounting Information Systems Romney and Steinbart Linda Batch March 2012

Chapter 10 – System Availability

• Minimize downtime and ensure efficient return to normal operations

• Ensure there is a contingency plan to get the system running

Page 14: Deck 10 Accounting Information Systems Romney and Steinbart Linda Batch March 2012

Chapter 10 – System Availability

• Lost data needs to be considered plus the data that is not being collected while the system is down

• Recovery point objective (RPO) – how much data is the organization willing to lose

• Recovery time objective (RTO) – the length of time the organization is willing to operate without the AIS

• These feed into the data recovery plan and the business continuity plan

Page 15: Deck 10 Accounting Information Systems Romney and Steinbart Linda Batch March 2012

Week 9 – Summary

• We are still talking about controls for system reliability• This week’s specific topics are confidentiality and availability

– Encryption - what is it– What makes encryption strong– Various types of encryption systems

• Data input integrity• Data processing integrity• Information output integrity• System uptime (downtime)

– Recovery point objective, Recovery time objective

• Quiz Next Week on Chapter 9 and 10